The ability to isolate an endpoint is invaluable when working through the containment phase of incident response. Isolating an endpoint prevents all network communication, with the exception of communication to the EDR/EPP platform and any configured exclusions.
Endpoint isolation can only be performed by users with the Responder role.
Isolating an endpoint
To isolate an endpoint:
- View the endpoint using ⌘-K or by clicking Endpoints and filtering for the endpoint’s hostname.
- Click Isolate Endpoint.
- Read and acknowledge the resulting prompt.
To isolate an endpoint referenced by a threat:
- View the threat using ⌘-K or by clicking Threats and filtering for the threat.
- At the top of the threat timeline, click Respond.
- Click Isolate Endpoint.
- Read and acknowledge the resulting prompt.
Removing isolation from an endpoint
Once a threat has been remediated, isolation can be removed to return the endpoint to normal operation.
To remove isolation from an endpoint:
- View the endpoint using ⌘-K or by clicking Endpoints and filtering for the endpoint’s hostname.
- Click Disable Isolation.
- Once the endpoint checks in with the server, it will restore normal network operation.
What happens if the endpoint is not online?
You can request isolation of—or remove isolation from—an endpoint that is offline. The request will be queued and executed when the endpoint comes back online and checks in with the EDR/EPP server.
Comments
0 comments
Please sign in to leave a comment.